Privacy-preserving function computation by exploitation of friendships in social networks

We study the problem of privacy-preserving computation of functions of data that belong to users in a social network under the assumption that users are willing to share their private data with trusted friends in the network. We demonstrate that such trust relationships can be exploited to significantly improve the tradeoff between the privacy of users' data and the accuracy of the computation. Under a one-hop trust model we design an algorithm for partitioning the users into circles of trust and develop a differentially private scheme for computing the global function using results of local computations within each circle. We quantify the improvement in the privacy-accuracy tradeoff of our scheme with respect to other mechanisms that do not exploit inter-user trust. We verify the efficiency of our algorithm by implementing it on social networks with up to one million nodes. Applications of our method include surveys, elections, and recommendation systems.

[1]  D. West Introduction to Graph Theory , 1995 .

[2]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[3]  Ran Wolff,et al.  k-TTP: a new privacy model for large-scale distributed environments , 2004, KDD.

[4]  Fatma Ozcan Proceedings of the 2005 ACM SIGMOD international conference on Management of data , 2005, SIGMOD 2005.

[5]  David P. Varodayan,et al.  Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Stanford,et al.  Learning to Discover Social Circles in Ego Networks , 2012 .

[7]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[8]  Wenliang Du,et al.  Deriving private information from randomized data , 2005, SIGMOD '05.

[9]  Panganamala Ramana Kumar,et al.  Computing and communicating functions over sensor networks , 2005, IEEE Journal on Selected Areas in Communications.

[10]  D. Marchette Random Graphs for Statistical Pattern Recognition , 2004 .

[11]  L. Takac DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS , 2012 .

[12]  Chris Clifton,et al.  A Guide to Differential Privacy Theory in Social Network Analysis , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[13]  Paris Smaragdis,et al.  A Framework for Secure Speech Recognition , 2007, IEEE Trans. Speech Audio Process..

[14]  Sheng Zhong,et al.  k-Anonymous data collection , 2009, Inf. Sci..

[15]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[16]  Julien Bringer,et al.  Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.

[17]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[18]  Mauro Barni,et al.  Private Computing with Garbled Circuits [Applications Corner] , 2013, IEEE Signal Processing Magazine.

[19]  Hong Shen,et al.  Effective Reconstruction of Data Perturbed by Random Projections , 2012, IEEE Transactions on Computers.

[20]  Zekeriya Erkin,et al.  Generating private recommendations in a social trust network , 2011, 2011 International Conference on Computational Aspects of Social Networks (CASoN).

[21]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[22]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[23]  Jianer Chen,et al.  Performance Measurements for Privacy Preserving Data Mining , 2005, PAKDD.

[24]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption , 2013 .

[25]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[26]  Claudio Orlandi,et al.  Is multiparty computation any good in practice? , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[28]  Pramod Viswanath,et al.  The optimal mechanism in differential privacy , 2012, 2014 IEEE International Symposium on Information Theory.

[29]  Parv Venkitasubramaniam,et al.  Maximizing privacy in Variable Bit rate Coding , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[30]  H. Vincent Poor,et al.  The Role of Signal Processing in Meeting Privacy Challenges: An Overview , 2013, IEEE Signal Processing Magazine.

[31]  Assaf Schuster,et al.  Data mining with differential privacy , 2010, KDD.

[32]  Hong Shen,et al.  Efficient and secure protocols for privacy-preserving set operations , 2009, TSEC.

[33]  Laurence A. Wolsey,et al.  Integer and Combinatorial Optimization , 1988 .